General

  • Target

    d92c8fd829d80c9b0700fd077957d8a00ff17064b001d147233b971aea0e442f

  • Size

    8.8MB

  • Sample

    250321-31zl3sxmy6

  • MD5

    b8749ed305053ea52cb866fd6dd7444c

  • SHA1

    cd9931622abdaca64ee70021965606a199c2bc12

  • SHA256

    d92c8fd829d80c9b0700fd077957d8a00ff17064b001d147233b971aea0e442f

  • SHA512

    6d2dc1cde0dd94ed4ce4abef7334f5e703559a6d2749bbed2cfa264c4b6a5cad45716fcad47f506777f3e73c6dfd23c9d538e607b4012e46227d29362935e5bc

  • SSDEEP

    196608:JbUoY2S7vhEYoQRl90WGQ647qfsrLgbO6JL1gf408gBArrX/s0WbhJ:JbUoYvhN90LH47qUaL1g5tAXPFWbP

Malware Config

Extracted

Family

trickmo

C2

http://somakeawish.com/hpuex9yu0lfad7pjoxcl

Targets

    • Target

      d92c8fd829d80c9b0700fd077957d8a00ff17064b001d147233b971aea0e442f

    • Size

      8.8MB

    • MD5

      b8749ed305053ea52cb866fd6dd7444c

    • SHA1

      cd9931622abdaca64ee70021965606a199c2bc12

    • SHA256

      d92c8fd829d80c9b0700fd077957d8a00ff17064b001d147233b971aea0e442f

    • SHA512

      6d2dc1cde0dd94ed4ce4abef7334f5e703559a6d2749bbed2cfa264c4b6a5cad45716fcad47f506777f3e73c6dfd23c9d538e607b4012e46227d29362935e5bc

    • SSDEEP

      196608:JbUoY2S7vhEYoQRl90WGQ647qfsrLgbO6JL1gf408gBArrX/s0WbhJ:JbUoYvhN90LH47qUaL1g5tAXPFWbP

    • TrickMo

      TrickMo is an Android banking trojan with the capability to intercept 2FA codes first seen in September 2019.

    • Trickmo family

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries the phone number (MSISDN for GSM devices)

    • Queries the mobile country code (MCC)

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks